【正文】
參考文獻[1] 國家863中部軟件孵化器. C從入門到精通[M]. 人民郵電出版社, 2010.[2][J].大眾科技,(4):3035[3][J].寶雞文理學院學報,2013,33(2):5760[4][D].北京郵電大學,2011[5]章精設, 胡登濤. Flash ActionScript [M]. 清華大學出版社, 2008.[6],2012[7]呂偉梅,鄭慶華,黃華等,移動流媒體播放器的設計與實現(xiàn),計算機科學,2008,35(9):126~128[8] 王履程,王靜,譚筠梅,多媒體通信技術,成都:西南交通大學出版社,2010,1~311[9] 吳銘杰,中國移動流媒體業(yè)務平臺發(fā)展及演進的分析與研究:[碩士學位論文],上海;上海交通大學,2007附錄附錄一 英文文獻Security against Side Channel Attack in CloudComputingBhrugu SevakAbstractCloud puting is a word that delivering hosted service over the internet. Cloud puting has been ideate as the next generation architecture of IT enterprise ecause of it’s provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing of cloud puting technology introduces new more vulnerabilities so security is considered to be one of the most critical aspect in clod puting environment due to the confidential and important information stored in the cloud. As per AMAZONE EC2 service case study it is possible to identify the particular target VM(virtual machine) in internal cloud infrastructure and then placed new VM with targeted VM and extract confidential information from targeted VM on same physical machine called as simple side channel attack. This paper introduces how to avert the side channel attack in cloud puting. This is acplished by using bination of Virtual firewall appliance and randomly encryption decryption (using concept of confusion diffusion) and provide RAS (Reliability, Availability, and Security) of client’s data or information. KeywordsCloud puting, side channel attack, Amazon EC2 service case study, virtual firewall appliance, randomly encryption decryption. I. INTRODUCTIONCloud puting is a word that delivering hosted service over the internet. Cloud puting is the use of puting resource (hardware and software) that are delivered as a service over an internet puting architecture as show in figure 1 is divided into two sections: Front end and Back end. They connect to each other through network, usually internet. The front end side is puter user or client and back end is cloud provider. The front end includes the client’s puter and the application required to access the cloud puting system. On the back end of the system are the various puters, virtual machines (VMs), servers and data storage system that create the cloud of puting service. Cloud puting is deployed as three model such as Public Cloud, Private Cloud, Hybrid Cloud. Public Cloud: A public cloud is one based on the standard cloud puting model in which a service provider makes resources such as application and storage available to general public over internet. Public cloud services may be free or offered on payperusage model. Private Cloud: It is also called as internal cloud or corporate cloud. Private cloud is cloud infrastructure operated for single organization and managed by third party and hosted internally or externally. Hybrid Cloud: A hybrid cloud is a position of at least one private cloud and at least one public cloud (bination of both public and private cloud). It is a cloud puting environment in which an organization provides and manages some resources in house and has others provided externally. These services are classified into three types: Infrastructure as a service (Iaas), Platform as a service (Paas), and Software as a service (SaaS). Infrastructure as a service (Iaas): This is most basic cloud service model like providers offer puters as physical or more virtual machine and other resources. The virtual machine are run as guests by a hypervisor or Virtual machine Manager or monitor(VMM).Platform as a service (PaaS): In this cloud service model cloud providers delivers a puting platform like operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solution on a cloud platform without the cost of buying and managing the under laying hardware and software. With some PaaS offers, the under laying puter and storage resources scale automatically to match application demand such that cloud user does not have to allocate resources manually. Software as a service (SaaS): In this cloud service model cloud providers install and operate application software in the cloud and cloud users access the software. Some type of cloud based application software like Desktop as a service (Daas), business process as a service, and munication as a service. II. SIDE CHANNEL ATTACK Infrastructure as a Service(IaaS) model in cloud puting provides infrastructures like a collection of multiple puters, virtual machines(VMs) and other resources to its users to store their application, file, confidential information, documents and so on. Using the Amazon EC2 service as a case study, it is possible to map the internal cloud infrastructure and identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed coresident with the target the successfully placement of instantiate VM to targeted VM then extract the confidential information from the targeted VM called as a Side channel attack. Side channel attack requires two main steps: Placement and Extraction. Placement refers to the adversary or attacker arranging to place their malicious VM on the same physical machine. Extraction: After successfully placement of the malicious VM to the targeted VM extract the confidential information, file and documents on the targeted VM. There are numbers of ways for such attack but n this paper I focus on side channel attack. III. AMAZON’S EC2 SERVICE Amazon’s Elastic Compute Cloud (EC2) service, which enables users to flexibility, rent putational resources for use by their application. EC2 provides the ability to run Linux, FreeBSD, OpenSolaris and Windows as guest operating systems within a virtual machine (VM) provided by a version of the Xen hypervisor. The hype